Reduce Business Systems Costs With a Meta Data RepositoryPublisher: UdemyAuthor: Dan GrijzenhoutDuration: 01:22:19Link:https://www.udemy.com/reduce-business-systems-costs-with-a-meta-data-repository/Learn how to design, construct, operate and share the contents of an ELDR/MDRAs corporations increase in size and complexity, securing, managing and insuring the integrity and accuracy of internal data becomes a critical component to continued corporate growth. If a corporation is growing, there will come a time in each entity's evolution where an ELDR (Enterprise Level Data Repository/Meta Data Repository) becomes an integral component to the organizations information systems architecture. – Introduction and Enterprise Level Data Repository Frameworks 5 Lectures 39:24 This course assists the student in learning how to define and construct an Enterprise Level Data Repository (ELDR). Within this course, we will define both an architectural and a management/operational framework for the Repository. The full scope of this course lecture series includes the following: •A defined and sample Repository Management Framework for a Corporation globally.•Defined personnel roles to manage this environment including an overview of tasks usually relating to each of the roles.•An ELDR “Help Desk” support environment definition including training tips; and,•An initial definition of targeted users of the ELDR systems and tools; Introduction to Enterprise Level Meta Data Repositories Preview 08:41 As corporations grow, undertaking the construction and deployment of an Enterprise Level Meta Data Repository becomes an almost "Must Do" project. The increasing complexities of systems and data as corporations globally deploy need some form of structured meta data environment else the corporation is at risk of losing control of its internal information assets; and this can hurt them as they continue to try to compete in the marketplace. This lecture discusses in overview what an ELDR actually is, the benefits of implementing one within a corporate environment and the risks a corporation will face if it does not build one - so be sure to check this lecture out! Why a Build an Enterprise Level Meta Data Repository? Preview 07:29 This lecture provides detailed definitions of key terms used in this lecture series that the student should understand before going through the full course. Key Terms to Learn in This Lecture Series 05:38 Database referential integrity is not just a database design feature to be taken for granted when databases are implemented and deployed. As a database and systems architect, when working with high concurrent user and high availability systems, you will need to thoroughly understand referential integrity and all its ramifications to your final deployed database designs. In high availability systems, its usage becomes in actuality, an architectural design consideration. Database Referential Integrity and Its Importance in High Availability Systems 09:56 A Global Data Dictionary is a "cornerstone" component to a Meta Data Repository. Be sure to watch this video to learn what types of content a corporation should be collecting about their internal data and application systems through these "Dictionaries". Building a Global Data Dictionary 07:40 – Enterprise Level Data Repositories - Strategies, Rationale and Implications 8 Lectures 41:46 This lecture provides the student with important "Best Practice" information relating to Repository Management. Rationale, Implications and general tasks need to be completed in relation to implementing a sound Repository Management strategy are documented within this lecture. The Overall Repository Management Strategy 05:09 This lecture provides the student with important "Best Practice" information relating to Data Management. Rationale, Implications and general tasks need to be completed in relation to implementing a sound Data Management strategy are documented within this lecture. Data Management Strategies, Rationale and Implications 07:18 This lecture provides the student with important "Best Practice" information relating to categorizing data between operational and decision support systems. Rationale, Implications and general tasks need to be completed in relation to implementing sound data categorization strategies are documented within this lecture. Data Categorization Strategies, Rationale and Implications 08:53 This lecture provides the student with important "Best Practice" information relating to distributing a Meta Data Repository within geographically dispersed and complex corporations. Rationale, Implications and general tasks need to be completed in relation to implementing sound data distribution strategies are documented within this lecture. Data Distribution Strategies, Rationale and Implications 03:28 This lecture provides the student with important "Best Practice" information relating to implementing sound data transaction management services within complex corporations. Rationale, Implications and general tasks need to be completed in relation to implementing sound data transaction management services strategies are documented within this lecture. Data Transaction Management Services 02:45 This lecture provides the student with important "Best Practice" information relating to maintaining data integrity within a Meta Data Repository environment. Rationale, Implications and general tasks need to be completed in relation to implementing sound data integrity strategies are documented within this lecture. Data Integrity Strategies, Rationale and Implications 08:17 This lecture provides the student with important "Best Practice" information relating to implementing effective Meta Data Repository security strategies to protect the MDR/ELDR environment. Rationale, Implications and general tasks need to be completed in relation to implementing sound data security strategies are documented within this lecture. Data Security Strategies, Rationale and Implications 02:34 This lecture provides the student with useful knowledge on how to implement useful MDR security profiles for those that have a need to access the MDR environment. Rationale, Implications and general tasks need to be completed in relation to implementing security profiles for end users of the MDR/ELDR are documented within this lecture. ELDR Security Profiles 03:22 – Quiz and Bonus Section 1 Lecture 01:09 Bonus Lecture: Congratulations and More Course Discounts for You 01:09